InterGuard InterGuard The only The only complete complete internal threat internal threat
platformplatformData Loss PreventionWeb Filtering Laptop SecurityEmployee Monitoring
Total Visibility and Control
• Based in Los Angeles, CA
• Founded in 2002
• Patented SaaS technology (Interguard) used by government and law enforcement agencies, financial service companies, banks, hospitals, schools, and more
• Over 200,000 Total Users
• Over 10,000 Corporate Customers
Who is Awareness Technologies?Total Visibility and Control
1. A complete internal threat prevention platform
– Data Loss Prevention– Web Filtering
2. Simple SaaS Solution
– Fast download to try, easy to buy– No hardware required
3. End-Point Architecture (next gen technology)
– Works everywhere (unmatched control)– Sees everything (unmatched visibility)
What is InterGuard?
– Laptop Recovery
– Employee Monitoring
Total Visibility and Control
1. Single Point Solutions
– Multiple Vendors– Multiple User
Interfaces
Competition
2. Complex Network Trials/Installs
+ Hardware Required
3. Works only on network and can only capture specified traffic
Viruses
Spam
Hackers
Malware
Security 2000 - 2009
Company Network
Complete Internal Threat Platform
External Threats
Viruses
Spam
Hackers
Malware
Security 2000 - 2009Complete Internal Threat Platform
Advent of UTM
Company Network
Anti-V
irus
Anti-Spam
Firewall
Anti-
Mal
war
e
Viruses
Spam
Hackers
Malware
Security 2010 and Beyond
Company Network
Employee Errors& Regulatory
Failures
ConfidentialData
EmployeeProductivity
LaptopTheft/Loss
Complete Internal Threat Platform
Company Network
Anti-V
irus
Anti-Spam
Firewall
Anti-
Mal
war
e
Internal threats are for more damaging
Viruses
Spam
Hackers
Malware
Employee Errors& Regulatory
Failures
ConfidentialData
EmployeeProductivity
LaptopTheft/Loss
Company Network
Security 2010 and BeyondComplete Internal Threat Platform
Company Network
Anti-V
irus
Anti-Spam
Firewall
Anti-
Mal
war
e
Single PointSolutions
InterGuard
DLP
EMPLOYEE MONITORING
WEB
FIL
TER
ING
LA
PTO
P R
EC
OV
ER
Y
The Power of OneAgent to Deploy
User Interface
Contract
Bill
Support Team
SimplicityTry, Buy, Install
and Manage
Simple, Complete SaaS Solution
Organization
RemoteEmployee
EmployeeOn the Road
Easily download and installagents on each workstation
Simple, Complete SaaS Solution
ATI Data Center
INTERNET
Employeeon the Road
Reporting
INTERNET
Organization
RemoteEmployee
Simple, Complete SaaS Solution
ATI Data Center
CoverageWorks Everywhere
Next Gen Technology – End-Point Architecture
VisionSees Everything
OLD WAY
Next Gen – Works Everywhere
OLD WAY
RemoteEmployee
Employeeon the Road
NO COVERAGE NO COVERAGE
Next Gen – Works Everywhere
INTERGUARD WAY
Next Gen – Works Everywhere
Employeeon the Road
INTERGUARD WAY
RemoteEmployee
ALL WORKSTATIONS ARE COVERED – ON AND OFF NETWORK
Next Gen – Works Everywhere
CoverageWorks Everywhere
Next Gen Technology – End-Point Architecture
VisionSees Everything
Standard Web Filtering
Web Browsing Is Web Browsing the only
unproductive use of a computer?
Next Gen – Sees Everything
Standard Web Filtering
Web Browsing
Next Gen – Sees Everything
Web Browsing is
just one piece of the
pie
Web Browsing
Next Generation Web Filtering
Business Email Microsoft Office
Personal Email
Media PlayerIM/ChatFile SharingGames
Next Gen – Sees Everything
Contextis Everything
Next Gen – Sees Everything
Standard Web Filtering Records:
• Aim.com• Amazon.com• Careerbuilder.com• Ebay.com• Etrade.com• Gambling.com• Google.com• Hotjobs.com• Espn.com• Facebook.com,
etc.
List of URLs Does the list of
blocked URLs tell the whole
story?
Next Gen – Sees Everything
Standard Web Filtering Records:
• Aim.com• Amazon.com• Careerbuilder.com• Ebay.com• Etrade.com• Gambling.com• Google.com• Hotjobs.com• Espn.com• Facebook.com,
etc.
List of URLs
InterGuard Records:
• Aim.com• Amazon.com• Careerbuilder.c
om• Ebay.com• Etrade.com, etc.
List of URLS
• Best ways to sue your employer
• How to find a better job
• Discount alcohol• How to beat a drug
test• Best sick day
excuses
List of Searches
Screenshots:
ESPN.com
HotJobs.com
Standard Data Loss PreventionPreventPrevention is
just a small piece of the pie…
Next Gen – Sees Everything
Standard Data Loss PreventionPreventAre your
policies perfect?
Next Gen – Sees Everything
If not, how would you know?
Standard Data Loss PreventionPrevent
Record
Do you know where your sensitive data is?
Next Gen – Sees Everything
Standard Data Loss PreventionPrevention
Discover
Record
If information leaked, could you delete it?
Next Gen – Sees Everything
Standard Data Loss PreventionPrevention
Discover
Delete Record
Can you retrieve the laptop if it is lost?
Next Gen – Sees Everything
Next Generation Data ProtectionLocate/Disable
Discover
Prevent
Delete Record
Next Gen – Sees Everything
1. A complete internal threat prevention platform
– Data Loss Prevention– Web Filtering
2. Simple SaaS Solution
– Fast download to try, easy to install; no hardware
3. End-Point Architecture (next gen technology)
– Works everywhere (unmatched control)– Sees everything (unmatched visibility)
Unique Technology with No Equal
– Laptop Recovery– Employee Monitoring
Total Visibility and Control
Data Loss Prevention
Web Filtering
Employee Monitoring
Laptop Security
Next Steps
• Screen all email (work and personal) and attachments for sensitive data and block if desired
• Protect from misuse or misappropriation of trade secrets, Non-Public Personal Information Control or stop use of removable media
• Block files, based on their content, from being copied to removable media
• Protect and enforce policies governing each employee’s computer use, including those that never connect to a network (even laptops)
• Easy, intuitive policy creation
• Coach and educate employees to adopt protocol and best practices for protecting company data
• Reports back to secure server over standard HTTPS protocols, instead of network
• Identify, track, and control who accesses your data, what data they access, and what they can and cannot do with that data
Data Loss PreventionTotal Visibility and Control
• Monitors and filters Internet use on and off the network (even on laptops)
• Blocks or limits applications like P2P, IM
• Screenshots taken whenever an alert word is typed or read on a webpage
• All Search Terms captured
• Works on and off network
Web FilteringTotal Visibility and Control
• Works invisibly and undetectably at each desktop, without impacting central network computer resources
• Records all employee communications - Email (including. webmail) & Instant Messaging
• Monitors and filters Internet use on and off the network (even on laptops)
• Blocks or limits applications like P2P, IM
• Records and analyzes all keystroke activity, regardless of the application used
• Formats all data into easy-to-read reports, making it easy to find and evaluate critical security lapses
• Screenshots taken whenever an alert word is typed or read on a webpage
• Conclusive, actionable data hard-linked to a specific employee’s actions, with full individualized reporting on an employee’s computer activity
Employee MonitoringTotal Visibility and Control
• Remotely retrieve important files invisibly, using any internet connection
• Remotely delete files or an entire hard drive
• Secure and confirm deletion to the highest Pentagon standard of unrecoverability
• Geo-locate the stolen laptop, in real-time over any internet connection, often with greater accuracy than GPS
• Monitor and control everything a thief does – every keystroke they type and file they access will be visable
• Lock down laptop after disappearance so files can’t be accessed
Laptop SecurityTotal Visibility and Control